public function getPublicPoint()
 {
     if (extension_loaded('gmp') && USE_EXT == 'GMP') {
         //alice selects a random number between 1 and the order of the generator point(private)
         $n = $this->generator->getOrder();
         $this->secret = gmp_Utils::gmp_random($n);
         //Alice computes da * generator Qa is public, da is private
         $this->pubPoint = Point::mul($this->secret, $this->generator);
         return $this->pubPoint;
     } else {
         if (extension_loaded('bcmath') && USE_EXT == 'BCMATH') {
             //alice selects a random number between 1 and the order of the generator point(private)
             $n = $this->generator->getOrder();
             $this->secret = bcmath_Utils::bcrand($n);
             //Alice computes da * generator Qa is public, da is private
             $this->pubPoint = Point::mul($this->secret, $this->generator);
             return $this->pubPoint;
         } else {
             throw new ErrorException("Please Install BCMATH or GMP.");
         }
     }
 }
 public static function secp256k1_params()
 {
     if (extension_loaded('gmp') && USE_EXT == 'GMP') {
         return array('p' => gmp_Utils::gmp_hexdec('0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F'), 'a' => gmp_Utils::gmp_hexdec('0x0000000000000000000000000000000000000000000000000000000000000000'), 'b' => gmp_Utils::gmp_hexdec('0x0000000000000000000000000000000000000000000000000000000000000007'), 'n' => gmp_Utils::gmp_hexdec('0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141'), 'x' => gmp_Utils::gmp_hexdec("0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798"), 'y' => gmp_Utils::gmp_hexdec("0x483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8"));
     } else {
         if (extension_loaded('bcmath') && USE_EXT == 'BCMATH') {
             return array('p' => bcmath_Utils::bchexdec('0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F'), 'a' => bcmath_Utils::bchexdec('0x0000000000000000000000000000000000000000000000000000000000000000'), 'b' => bcmath_Utils::bchexdec('0x0000000000000000000000000000000000000000000000000000000000000007'), 'n' => bcmath_Utils::bchexdec('0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141'), 'x' => bcmath_Utils::bchexdec("0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798"), 'y' => bcmath_Utils::bchexdec("0x483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8"));
         }
     }
 }
 public static function generator_521()
 {
     # NIST Curve P-521:
     if (extension_loaded('gmp') && USE_EXT == 'GMP') {
         $_p = '6864797660130609714981900799081393217269435300143305409394463459185543183397656052122559640661454554977296311391480858037121987999716643812574028291115057151';
         $_r = '6864797660130609714981900799081393217269435300143305409394463459185543183397655394245057746333217197532963996371363321113864768612440380340372808892707005449';
         $_b = gmp_Utils::gmp_hexdec('0x051953eb9618e1c9a1f929a21a0b68540eea2da725b99b315f3b8b489918ef109e156193951ec7e937b1652c0bd3bb1bf073573df883d2c34f1ef451fd46b503f00');
         $_Gx = gmp_Utils::gmp_hexdec('0xc6858e06b70404e9cd9e3ecb662395b4429c648139053fb521f828af606b4d3dbaa14b5e77efe75928fe1dc127a2ffa8de3348b3c1856a429bf97e7e31c2e5bd66');
         $_Gy = gmp_Utils::gmp_hexdec('0x11839296a789a3bc0045c8a5fb42c7d1bd998f54449579b446817afbd17273e662c97ee72995ef42640c550b9013fad0761353c7086a272c24088be94769fd16650');
         $curve_521 = new CurveFp($_p, -3, $_b);
         $generator_521 = new Point($curve_521, $_Gx, $_Gy, $_r);
     } else {
         if (extension_loaded('bcmath') && USE_EXT == 'BCMATH') {
             $_p = '6864797660130609714981900799081393217269435300143305409394463459185543183397656052122559640661454554977296311391480858037121987999716643812574028291115057151';
             $_r = '6864797660130609714981900799081393217269435300143305409394463459185543183397655394245057746333217197532963996371363321113864768612440380340372808892707005449';
             $_b = bcmath_Utils::bchexdec('0x051953eb9618e1c9a1f929a21a0b68540eea2da725b99b315f3b8b489918ef109e156193951ec7e937b1652c0bd3bb1bf073573df883d2c34f1ef451fd46b503f00');
             $_Gx = bcmath_Utils::bchexdec('0xc6858e06b70404e9cd9e3ecb662395b4429c648139053fb521f828af606b4d3dbaa14b5e77efe75928fe1dc127a2ffa8de3348b3c1856a429bf97e7e31c2e5bd66');
             $_Gy = bcmath_Utils::bchexdec('0x11839296a789a3bc0045c8a5fb42c7d1bd998f54449579b446817afbd17273e662c97ee72995ef42640c550b9013fad0761353c7086a272c24088be94769fd16650');
             $curve_521 = new CurveFp($_p, -3, $_b);
             $generator_521 = new Point($curve_521, $_Gx, $_Gy, $_r);
         }
     }
     return $generator_521;
 }
Esempio n. 4
0
 /**
 * Generate a new private key
 *
 * @author Jacob Bruce
 * @return string
 * @access public
 */
 public static function getNewPrivKey()
 {
     $g = SECcurve::generator_secp256k1();
     $n = $g->getOrder();
     do {
         if (extension_loaded('gmp') && USE_EXT == 'GMP') {
             $privKey = gmp_Utils::gmp_random($n);
         } else {
             if (extension_loaded('bcmath') && USE_EXT == 'BCMATH') {
                 $privKey = bcmath_Utils::bcrand(1, $n);
             }
         }
         $privKeyHex = self::encodeHex($privKey);
     } while ($privKey < 1 || strlen($privKeyHex) > 64);
     return str_pad($privKeyHex, 64, '0', STR_PAD_LEFT);
 }
 public static function bcmath_signatureValidity($verbose = false)
 {
     $start_time = microtime(true);
     $p192 = NISTcurve::generator_192();
     $d = '651056770906015076056810763456358567190100156695615665659';
     $k = '6140507067065001063065065565667405560006161556565665656654';
     $e = '968236873715988614170569073515315707566766479517';
     $pubk = new PublicKey($p192, Point::rmul($p192, $d));
     $privk = new PrivateKey($pubk, $d);
     $sig = $privk->sign($e, $k);
     $r = $sig->getR();
     $s = $sig->getS();
     if ($r != '3342403536405981729393488334694600415596881826869351677613' || $s != '5735822328888155254683894997897571951568553642892029982342') {
         print "*** r or s came out wrong.<br />";
         flush();
     } else {
         if ($verbose) {
             print "r and s came out right.<br />";
         }
         flush();
     }
     $valid = $pubk->verifies($e, $sig);
     if ($valid) {
         if ($verbose) {
             print "Signature verified OK.<br />";
         }
         flush();
     } else {
         print "*** Signature failed verification.<br />";
         flush();
     }
     $valid = $pubk->verifies(bcsub($e, 1), $sig);
     if (!$valid) {
         if ($verbose) {
             print "Forgery was correctly rejected.<br />";
         }
         flush();
     } else {
         print "*** Forgery was erroneously accepted.<br />";
     }
     flush();
     if ($verbose) {
         print "Trying signature-verification tests from ECDSAVS.pdf B.2.4:<br />";
     }
     flush();
     if ($verbose) {
         print "P-192:";
     }
     flush();
     $Msg = bcmath_Utils::bchexdec('0x84ce72aa8699df436059f052ac51b6398d2511e49631bcb7e71f89c499b9ee425dfbc13a5f6d408471b054f2655617cbbaf7937b7c80cd8865cf02c8487d30d2b0fbd8b2c4e102e16d828374bbc47b93852f212d5043c3ea720f086178ff798cc4f63f787b9c2e419efa033e7644ea7936f54462dc21a6c4580725f7f0e7d158');
     $Qx = bcmath_Utils::bchexdec('0xd9dbfb332aa8e5ff091e8ce535857c37c73f6250ffb2e7ac');
     $Qy = bcmath_Utils::bchexdec('0x282102e364feded3ad15ddf968f88d8321aa268dd483ebc4');
     $R = bcmath_Utils::bchexdec('0x64dca58a20787c488d11d6dd96313f1b766f2d8efe122916');
     $S = bcmath_Utils::bchexdec('0x1ecba28141e84ab4ecad92f56720e2cc83eb3d22dec72479');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, true, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x94bb5bacd5f8ea765810024db87f4224ad71362a3c28284b2b9f39fab86db12e8beb94aae899768229be8fdb6c4f12f28912bb604703a79ccff769c1607f5a91450f30ba0460d359d9126cbd6296be6d9c4bb96c0ee74cbb44197c207f6db326ab6f5a659113a9034e54be7b041ced9dcf6458d7fb9cbfb2744d999f7dfd63f4');
     $Qx = bcmath_Utils::bchexdec('0x3e53ef8d3112af3285c0e74842090712cd324832d4277ae7');
     $Qy = bcmath_Utils::bchexdec('0xcc75f8952d30aec2cbb719fc6aa9934590b5d0ff5a83adb7');
     $R = bcmath_Utils::bchexdec('0x8285261607283ba18f335026130bab31840dcfd9c3e555af');
     $S = bcmath_Utils::bchexdec('0x356d89e1b04541afc9704a45e9c535ce4a50929e33d7e06c');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, true, $verbose);
     $Msg = bcmath_Utils::bchexdec('0xf6227a8eeb34afed1621dcc89a91d72ea212cb2f476839d9b4243c66877911b37b4ad6f4448792a7bbba76c63bdd63414b6facab7dc71c3396a73bd7ee14cdd41a659c61c99b779cecf07bc51ab391aa3252386242b9853ea7da67fd768d303f1b9b513d401565b6f1eb722dfdb96b519fe4f9bd5de67ae131e64b40e78c42dd');
     $Qx = bcmath_Utils::bchexdec('0x16335dbe95f8e8254a4e04575d736befb258b8657f773cb7');
     $Qy = bcmath_Utils::bchexdec('0x421b13379c59bc9dce38a1099ca79bbd06d647c7f6242336');
     $R = bcmath_Utils::bchexdec('0x4141bd5d64ea36c5b0bd21ef28c02da216ed9d04522b1e91');
     $S = bcmath_Utils::bchexdec('0x159a6aa852bcc579e821b7bb0994c0861fb08280c38daa09');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x16b5f93afd0d02246f662761ed8e0dd9504681ed02a253006eb36736b563097ba39f81c8e1bce7a16c1339e345efabbc6baa3efb0612948ae51103382a8ee8bc448e3ef71e9f6f7a9676694831d7f5dd0db5446f179bcb737d4a526367a447bfe2c857521c7f40b6d7d7e01a180d92431fb0bbd29c04a0c420a57b3ed26ccd8a');
     $Qx = bcmath_Utils::bchexdec('0xfd14cdf1607f5efb7b1793037b15bdf4baa6f7c16341ab0b');
     $Qy = bcmath_Utils::bchexdec('0x83fa0795cc6c4795b9016dac928fd6bac32f3229a96312c4');
     $R = bcmath_Utils::bchexdec('0x8dfdb832951e0167c5d762a473c0416c5c15bc1195667dc1');
     $S = bcmath_Utils::bchexdec('0x1720288a2dc13fa1ec78f763f8fe2ff7354a7e6fdde44520');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x08a2024b61b79d260e3bb43ef15659aec89e5b560199bc82cf7c65c77d39192e03b9a895d766655105edd9188242b91fbde4167f7862d4ddd61e5d4ab55196683d4f13ceb90d87aea6e07eb50a874e33086c4a7cb0273a8e1c4408f4b846bceae1ebaac1b2b2ea851a9b09de322efe34cebe601653efd6ddc876ce8c2f2072fb');
     $Qx = bcmath_Utils::bchexdec('0x674f941dc1a1f8b763c9334d726172d527b90ca324db8828');
     $Qy = bcmath_Utils::bchexdec('0x65adfa32e8b236cb33a3e84cf59bfb9417ae7e8ede57a7ff');
     $R = bcmath_Utils::bchexdec('0x9508b9fdd7daf0d8126f9e2bc5a35e4c6d800b5b804d7796');
     $S = bcmath_Utils::bchexdec('0x36f2bf6b21b987c77b53bb801b3435a577e3d493744bfab0');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x1843aba74b0789d4ac6b0b8923848023a644a7b70afa23b1191829bbe4397ce15b629bf21a8838298653ed0c19222b95fa4f7390d1b4c844d96e645537e0aae98afb5c0ac3bd0e4c37f8daaff25556c64e98c319c52687c904c4de7240a1cc55cd9756b7edaef184e6e23b385726e9ffcba8001b8f574987c1a3fedaaa83ca6d');
     $Qx = bcmath_Utils::bchexdec('0x10ecca1aad7220b56a62008b35170bfd5e35885c4014a19f');
     $Qy = bcmath_Utils::bchexdec('0x04eb61984c6c12ade3bc47f3c629ece7aa0a033b9948d686');
     $R = bcmath_Utils::bchexdec('0x82bfa4e82c0dfe9274169b86694e76ce993fd83b5c60f325');
     $S = bcmath_Utils::bchexdec('0xa97685676c59a65dbde002fe9d613431fb183e8006d05633');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x5a478f4084ddd1a7fea038aa9732a822106385797d02311aeef4d0264f824f698df7a48cfb6b578cf3da416bc0799425bb491be5b5ecc37995b85b03420a98f2c4dc5c31a69a379e9e322fbe706bbcaf0f77175e05cbb4fa162e0da82010a278461e3e974d137bc746d1880d6eb02aa95216014b37480d84b87f717bb13f76e1');
     $Qx = bcmath_Utils::bchexdec('0x6636653cb5b894ca65c448277b29da3ad101c4c2300f7c04');
     $Qy = bcmath_Utils::bchexdec('0xfdf1cbb3fc3fd6a4f890b59e554544175fa77dbdbeb656c1');
     $R = bcmath_Utils::bchexdec('0xeac2ddecddfb79931a9c3d49c08de0645c783a24cb365e1c');
     $S = bcmath_Utils::bchexdec('0x3549fee3cfa7e5f93bc47d92d8ba100e881a2a93c22f8d50');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0xc598774259a058fa65212ac57eaa4f52240e629ef4c310722088292d1d4af6c39b49ce06ba77e4247b20637174d0bd67c9723feb57b5ead232b47ea452d5d7a089f17c00b8b6767e434a5e16c231ba0efa718a340bf41d67ea2d295812ff1b9277daacb8bc27b50ea5e6443bcf95ef4e9f5468fe78485236313d53d1c68f6ba2');
     $Qx = bcmath_Utils::bchexdec('0xa82bd718d01d354001148cd5f69b9ebf38ff6f21898f8aaa');
     $Qy = bcmath_Utils::bchexdec('0xe67ceede07fc2ebfafd62462a51e4b6c6b3d5b537b7caf3e');
     $R = bcmath_Utils::bchexdec('0x4d292486c620c3de20856e57d3bb72fcde4a73ad26376955');
     $S = bcmath_Utils::bchexdec('0xa85289591a6081d5728825520e62ff1c64f94235c04c7f95');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0xca98ed9db081a07b7557f24ced6c7b9891269a95d2026747add9e9eb80638a961cf9c71a1b9f2c29744180bd4c3d3db60f2243c5c0b7cc8a8d40a3f9a7fc910250f2187136ee6413ffc67f1a25e1c4c204fa9635312252ac0e0481d89b6d53808f0c496ba87631803f6c572c1f61fa049737fdacce4adff757afed4f05beb658');
     $Qx = bcmath_Utils::bchexdec('0x7d3b016b57758b160c4fca73d48df07ae3b6b30225126c2f');
     $Qy = bcmath_Utils::bchexdec('0x4af3790d9775742bde46f8da876711be1b65244b2b39e7ec');
     $R = bcmath_Utils::bchexdec('0x95f778f5f656511a5ab49a5d69ddd0929563c29cbc3a9e62');
     $S = bcmath_Utils::bchexdec('0x75c87fc358c251b4c83d2dd979faad496b539f9f2ee7a289');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x31dd9a54c8338bea06b87eca813d555ad1850fac9742ef0bbe40dad400e10288acc9c11ea7dac79eb16378ebea9490e09536099f1b993e2653cd50240014c90a9c987f64545abc6a536b9bd2435eb5e911fdfde2f13be96ea36ad38df4ae9ea387b29cced599af777338af2794820c9cce43b51d2112380a35802ab7e396c97a');
     $Qx = bcmath_Utils::bchexdec('0x9362f28c4ef96453d8a2f849f21e881cd7566887da8beb4a');
     $Qy = bcmath_Utils::bchexdec('0xe64d26d8d74c48a024ae85d982ee74cd16046f4ee5333905');
     $R = bcmath_Utils::bchexdec('0xf3923476a296c88287e8de914b0b324ad5a963319a4fe73b');
     $S = bcmath_Utils::bchexdec('0xf0baeed7624ed00d15244d8ba2aede085517dbdec8ac65f5');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, true, $verbose);
     $Msg = bcmath_Utils::bchexdec('0xb2b94e4432267c92f9fdb9dc6040c95ffa477652761290d3c7de312283f6450d89cc4aabe748554dfb6056b2d8e99c7aeaad9cdddebdee9dbc099839562d9064e68e7bb5f3a6bba0749ca9a538181fc785553a4000785d73cc207922f63e8ce1112768cb1de7b673aed83a1e4a74592f1268d8e2a4e9e63d414b5d442bd0456d');
     $Qx = bcmath_Utils::bchexdec('0xcc6fc032a846aaac25533eb033522824f94e670fa997ecef');
     $Qy = bcmath_Utils::bchexdec('0xe25463ef77a029eccda8b294fd63dd694e38d223d30862f1');
     $R = bcmath_Utils::bchexdec('0x066b1d07f3a40e679b620eda7f550842a35c18b80c5ebe06');
     $S = bcmath_Utils::bchexdec('0xa0b0fb201e8f2df65e2c4508ef303bdc90d934016f16b2dc');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x4366fcadf10d30d086911de30143da6f579527036937007b337f7282460eae5678b15cccda853193ea5fc4bc0a6b9d7a31128f27e1214988592827520b214eed5052f7775b750b0c6b15f145453ba3fee24a085d65287e10509eb5d5f602c440341376b95c24e5c4727d4b859bfe1483d20538acdd92c7997fa9c614f0f839d7');
     $Qx = bcmath_Utils::bchexdec('0x955c908fe900a996f7e2089bee2f6376830f76a19135e753');
     $Qy = bcmath_Utils::bchexdec('0xba0c42a91d3847de4a592a46dc3fdaf45a7cc709b90de520');
     $R = bcmath_Utils::bchexdec('0x1f58ad77fc04c782815a1405b0925e72095d906cbf52a668');
     $S = bcmath_Utils::bchexdec('0xf2e93758b3af75edf784f05a6761c9b9a6043c66b845b599');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x543f8af57d750e33aa8565e0cae92bfa7a1ff78833093421c2942cadf9986670a5ff3244c02a8225e790fbf30ea84c74720abf99cfd10d02d34377c3d3b41269bea763384f372bb786b5846f58932defa68023136cd571863b304886e95e52e7877f445b9364b3f06f3c28da12707673fecb4b8071de06b6e0a3c87da160cef3');
     $Qx = bcmath_Utils::bchexdec('0x31f7fa05576d78a949b24812d4383107a9a45bb5fccdd835');
     $Qy = bcmath_Utils::bchexdec('0x8dc0eb65994a90f02b5e19bd18b32d61150746c09107e76b');
     $R = bcmath_Utils::bchexdec('0xbe26d59e4e883dde7c286614a767b31e49ad88789d3a78ff');
     $S = bcmath_Utils::bchexdec('0x8762ca831c1ce42df77893c9b03119428e7a9b819b619068');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false);
     $Msg = bcmath_Utils::bchexdec('0xd2e8454143ce281e609a9d748014dcebb9d0bc53adb02443a6aac2ffe6cb009f387c346ecb051791404f79e902ee333ad65e5c8cb38dc0d1d39a8dc90add5023572720e5b94b190d43dd0d7873397504c0c7aef2727e628eb6a74411f2e400c65670716cb4a815dc91cbbfeb7cfe8c929e93184c938af2c078584da045e8f8d1');
     $Qx = bcmath_Utils::bchexdec('0x66aa8edbbdb5cf8e28ceb51b5bda891cae2df84819fe25c0');
     $Qy = bcmath_Utils::bchexdec('0x0c6bc2f69030a7ce58d4a00e3b3349844784a13b8936f8da');
     $R = bcmath_Utils::bchexdec('0xa4661e69b1734f4a71b788410a464b71e7ffe42334484f23');
     $S = bcmath_Utils::bchexdec('0x738421cf5e049159d69c57a915143e226cac8355e149afe9');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     $Msg = bcmath_Utils::bchexdec('0x6660717144040f3e2f95a4e25b08a7079c702a8b29babad5a19a87654bc5c5afa261512a11b998a4fb36b5d8fe8bd942792ff0324b108120de86d63f65855e5461184fc96a0a8ffd2ce6d5dfb0230cbbdd98f8543e361b3205f5da3d500fdc8bac6db377d75ebef3cb8f4d1ff738071ad0938917889250b41dd1d98896ca06fb');
     $Qx = bcmath_Utils::bchexdec('0xbcfacf45139b6f5f690a4c35a5fffa498794136a2353fc77');
     $Qy = bcmath_Utils::bchexdec('0x6f4a6c906316a6afc6d98fe1f0399d056f128fe0270b0f22');
     $R = bcmath_Utils::bchexdec('0x9db679a3dafe48f7ccad122933acfe9da0970b71c94c21c1');
     $S = bcmath_Utils::bchexdec('0x984c2db99827576c0a41a5da41e07d8cc768bc82f18c9da9');
     self::test_signature_validity($Msg, $Qx, $Qy, $R, $S, false, $verbose);
     if ($verbose) {
         print "Testing the example code:<br />";
     }
     flush();
     # Building a public/private key pair from the NIST Curve P-192:
     $g = NISTcurve::generator_192();
     $n = $g->getOrder();
     $secret = bcmath_Utils::bcrand($n);
     $secretG = Point::mul($secret, $g);
     $pubkey = new PublicKey($g, Point::mul($secret, $g));
     $privkey = new PrivateKey($pubkey, $secret);
     # Signing a hash value:
     $hash = bcmath_Utils::bcrand($n);
     $signature = $privkey->sign($hash, bcmath_Utils::bcrand($n));
     # Verifying a signature for a hash value:
     if ($pubkey->verifies($hash, $signature)) {
         if ($verbose) {
             print "Demo verification succeeded.<br />";
         }
         flush();
     } else {
         print "*** Demo verification failed.<br />";
         flush();
     }
     if ($pubkey->verifies(bcsub($hash, 1), $signature)) {
         print "**** Demo verification failed to reject tampered hash.<br />";
         flush();
     } else {
         if ($verbose) {
             print "Demo verification correctly rejected tampered hash.<br />";
         }
         flush();
     }
     $end_time = microtime(true);
     $time_res = $end_time - $start_time;
     echo "<br />Signing and verification tests from ECDSAVS.pdf B.2.4 took: " . $time_res . " seconds. <br />";
     flush();
 }
 public static function base58_encode($num)
 {
     self::debug('base58_encode: num: ' . $num);
     return bcmath_Utils::dec2base($num, 58, '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz');
 }
Esempio n. 7
0
 public static function mul($x2, Point $p1)
 {
     if (extension_loaded('gmp') && USE_EXT == 'GMP') {
         $e = $x2;
         if (self::cmp($p1, self::$infinity) == 0) {
             return self::$infinity;
         }
         if ($p1->order != null) {
             $e = gmp_strval(gmp_Utils::gmp_mod2($e, $p1->order));
         }
         if (gmp_cmp($e, 0) == 0) {
             return self::$infinity;
         }
         $e = gmp_strval($e);
         if (gmp_cmp($e, 0) > 0) {
             $e3 = gmp_mul(3, $e);
             $negative_self = new Point($p1->curve, $p1->x, gmp_strval(gmp_sub(0, $p1->y)), $p1->order);
             $i = gmp_div(self::leftmost_bit($e3), 2);
             $result = $p1;
             while (gmp_cmp($i, 1) > 0) {
                 $result = self::double($result);
                 if (gmp_cmp(gmp_and($e3, $i), 0) != 0 && gmp_cmp(gmp_and($e, $i), 0) == 0) {
                     $result = self::add($result, $p1);
                 }
                 if (gmp_cmp(gmp_and($e3, $i), 0) == 0 && gmp_cmp(gmp_and($e, $i), 0) != 0) {
                     $result = self::add($result, $negative_self);
                 }
                 $i = gmp_strval(gmp_div($i, 2));
             }
             return $result;
         }
     } else {
         if (extension_loaded('bcmath') && USE_EXT == 'BCMATH') {
             $e = $x2;
             if (self::cmp($p1, self::$infinity) == 0) {
                 return self::$infinity;
             }
             if ($p1->order != null) {
                 $e = bcmod($e, $p1->order);
             }
             if (bccomp($e, 0) == 0) {
                 return self::$infinity;
             }
             if (bccomp($e, 0) == 1) {
                 $e3 = bcmul(3, $e);
                 $negative_self = new Point($p1->curve, $p1->x, bcsub(0, $p1->y), $p1->order);
                 $i = bcdiv(self::leftmost_bit($e3), 2);
                 $result = $p1;
                 while (bccomp($i, 1) == 1) {
                     $result = self::double($result);
                     if (bccomp(bcmath_Utils::bcand($e3, $i), '0') != 0 && bccomp(bcmath_Utils::bcand($e, $i), '0') == 0) {
                         $result = self::add($result, $p1);
                     }
                     if (bccomp(bcmath_Utils::bcand($e3, $i), 0) == 0 && bccomp(bcmath_Utils::bcand($e, $i), 0) != 0) {
                         $result = self::add($result, $negative_self);
                     }
                     $i = bcdiv($i, 2);
                 }
                 return $result;
             }
         } else {
             throw new ErrorException("Please install BCMATH or GMP");
         }
     }
 }
 public static function next_prime($starting_value)
 {
     if (extension_loaded('gmp') && USE_EXT == 'GMP') {
         $result = gmp_strval(gmp_nextprime($starting_value));
         return $result;
     } else {
         if (extension_loaded('bcmath') && USE_EXT == 'BCMATH') {
             if (bccomp($starting_value, 2) == -1) {
                 return 2;
             }
             $result = bcmath_Utils::bcor(bcadd($starting_value, 1), 1);
             while (!self::is_prime($result)) {
                 $result = bcadd($result, 2);
             }
             return $result;
         } else {
             throw new ErrorException("Please install BCMATH or GMP");
         }
     }
 }
Esempio n. 9
0
function BWWC__MATH_generate_bitcoin_address_from_mpk($master_public_key, $key_index)
{
    if (USE_EXT != 'GMP' && USE_EXT != 'BCMATH') {
        return false;
    }
    /*
    	if (USE_EXT == 'GMP')
    	{
    		$utils_class = 'gmp_Utils';
    		$fn_bchexdec = 'gmp_hexdec';
    		$fn_dec2base = 'gmp_dec2base';
    		$fn_base2dec = 'gmp_base2dec';
    	}
    	else if (USE_EXT == 'BCMATH')
    	{
    		$utils_class = 'bcmath_Utils';
    		$fn_bchexdec = 'bchexdec';
    		$fn_dec2base = 'dec2base';
    		$fn_base2dec = 'base2dec';
    	}
    	else
    		return false;
    */
    // create the ecc curve
    if (USE_EXT == 'GMP') {
        // GMP
        $_p = gmp_Utils::gmp_hexdec('0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F');
        $_r = gmp_Utils::gmp_hexdec('0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141');
        $_b = gmp_Utils::gmp_hexdec('0x0000000000000000000000000000000000000000000000000000000000000007');
        $_Gx = gmp_Utils::gmp_hexdec('0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798');
        $_Gy = gmp_Utils::gmp_hexdec('0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8');
    } else {
        // BCMATH
        $_p = bcmath_Utils::bchexdec('0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F');
        $_r = bcmath_Utils::bchexdec('0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141');
        $_b = bcmath_Utils::bchexdec('0x0000000000000000000000000000000000000000000000000000000000000007');
        $_Gx = bcmath_Utils::bchexdec('0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798');
        $_Gy = bcmath_Utils::bchexdec('0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8');
    }
    $curve = new CurveFp($_p, 0, $_b);
    $gen = new Point($curve, $_Gx, $_Gy, $_r);
    // prepare the input values
    if (USE_EXT == 'GMP') {
        // GMP
        $x = gmp_Utils::gmp_hexdec('0x' . substr($master_public_key, 0, 64));
        $y = gmp_Utils::gmp_hexdec('0x' . substr($master_public_key, 64, 64));
        $z = gmp_Utils::gmp_hexdec('0x' . hash('sha256', hash('sha256', $key_index . ':0:' . pack('H*', $master_public_key), TRUE)));
    } else {
        // BCMATH
        $x = bcmath_Utils::bchexdec('0x' . substr($master_public_key, 0, 64));
        $y = bcmath_Utils::bchexdec('0x' . substr($master_public_key, 64, 64));
        $z = bcmath_Utils::bchexdec('0x' . hash('sha256', hash('sha256', $key_index . ':0:' . pack('H*', $master_public_key), TRUE)));
    }
    // generate the new public key based off master and sequence points
    $pt = Point::add(new Point($curve, $x, $y), Point::mul($z, $gen));
    if (USE_EXT == 'GMP') {
        // GMP
        $keystr = "" . str_pad(gmp_Utils::gmp_dec2base($pt->getX(), 256), 32, "", STR_PAD_LEFT) . str_pad(gmp_Utils::gmp_dec2base($pt->getY(), 256), 32, "", STR_PAD_LEFT);
    } else {
        // BCMATH
        $keystr = "" . str_pad(bcmath_Utils::dec2base($pt->getX(), 256), 32, "", STR_PAD_LEFT) . str_pad(bcmath_Utils::dec2base($pt->getY(), 256), 32, "", STR_PAD_LEFT);
    }
    $vh160 = "" . hash('ripemd160', hash('sha256', $keystr, TRUE), TRUE);
    $addr = $vh160 . substr(hash('sha256', hash('sha256', $vh160, TRUE), TRUE), 0, 4);
    // base58 conversion
    $alphabet = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz';
    $encoded = '';
    if (USE_EXT == 'GMP') {
        // GMP
        $num = gmp_Utils::gmp_base2dec($addr, 256);
    } else {
        // BCMATH
        $num = bcmath_Utils::base2dec($addr, 256);
    }
    while (intval($num) >= 58) {
        $div = bcdiv($num, '58');
        $mod = bcmod($num, '58');
        $encoded = $alphabet[intval($mod)] . $encoded;
        $num = $div;
    }
    $encoded = $alphabet[intval($num)] . $encoded;
    $pad = '';
    $n = 0;
    while ($addr[$n++] == "") {
        $pad .= '1';
    }
    return $pad . $encoded;
}